Hormuzd Khosravi, Principal Engineer, Intel Corporation



Similar documents
Software Token Security & Provisioning: Innovation Galore!

Intel Identity Protection Technology with PKI (Intel IPT with PKI)

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions

Deeper Levels of Security with Intel Identity Protection Technology

Intel Identity Protection Technology (IPT)

Intel Cyber Security Briefing: Trends, Solutions, and Opportunities. Matthew Rosenquist, Cyber Security Strategist, Intel Corp

Enhancing Organizational Security Through the Use of Virtual Smart Cards

with PKI Use Case Guide

Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

How To Manage A Plethora Of Identities In A Cloud System (Saas)

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems

Intel vpro Technology. How To Purchase and Install Symantec* Certificates for Intel AMT Remote Setup and Configuration

RSA SecurID Software Token 1.0 for Android Administrator s Guide

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Intel vpro Technology. How To Purchase and Install Go Daddy* Certificates for Intel AMT Remote Setup and Configuration

Entrust IdentityGuard

IBM Client Security Solutions. Client Security User's Guide

The Convergence of IT Security and Physical Access Control

Longmai Mobile PKI Solution

Intel Software Guard Extensions(Intel SGX) Carlos Rozas Intel Labs November 6, 2013

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Intel Media SDK Library Distribution and Dispatching Process

Introducing etoken. What is etoken?

That Point of Sale is a PoS

CLOUD SECURITY: Secure Your Infrastructure

Using Entrust certificates with VPN

Public Key Applications & Usage A Brief Insight

Check Point FDE integration with Digipass Key devices

Intel Remote Configuration Certificate Utility Frequently Asked Questions

Strong Authentication for Secure VPN Access

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa

RSA SecurID Two-factor Authentication

Secure Data Exchange Solution

How To Secure An Rsa Authentication Agent

Research Information Security Guideline

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Deriving a Trusted Mobile Identity from an Existing Credential

Ensuring the security of your mobile business intelligence

Intel Unite Solution. Standalone User Guide

Multi-factor authentication

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

How CA Arcot Solutions Protect Against Internet Threats

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

In-Depth Look at Capabilities: Samsung KNOX and Android for Work

Customer Whitepaper. Motion Tablet PC Security Basics. Table of Contents. Whitepaper Goals and Intended Audience...2

Microsoft Enterprise Mobility Suite

RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide

Two Factor Authentication for VPN Access

The Seven Habits of State-of-the-Art Mobile App Security

WHITE PAPER Usher Mobile Identity Platform

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Managed Portable Security Devices

Strong Authentication in details

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

Mobile device and application management. Speaker Name Date

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

The Convergence of IT Security and Physical Access Control

STRONGER AUTHENTICATION for CA SiteMinder

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

How To Get A New Computer For Your Business

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities. John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc.

X.509 Certificate Generator User Manual

IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers

Intel vpro Technology Use Case Reference Design

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Secure Network Communications FIPS Non Proprietary Security Policy

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

White Paper. The risks of authenticating with digital certificates exposed

Dashlane Security Whitepaper

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

Secure Web Access Solution

Securing corporate assets with two factor authentication

Guide to Evaluating Multi-Factor Authentication Solutions

Security Guide. BES12 Cloud. for BlackBerry

Ensuring the security of your mobile business intelligence

Advanced Authentication

Smart Card Setup Guide

Improving Online Security with Strong, Personalized User Authentication

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Secure remote access to your applications and data. Secure Application Access

PINsafe Multifactor Authentication Solution. Technical White Paper

Moving to Multi-factor Authentication. Kevin Unthank

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Authentication Solutions. Versatile And Innovative Authentication Solutions To Secure And Enable Your Business

Enhancing Web Application Security

Complying with PCI Data Security

McAfee Firewall Enterprise 8.2.1

Release Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved

SecureDoc Disk Encryption Cryptographic Engine

Transcription:

Hormuzd Khosravi, Principal Engineer, Intel Corporation

Legal Information Intel technologies, features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at intel.com. Intel's compilers may or may not optimize to the same degree for non-intel microprocessors for optimizations that are not unique to Intel microprocessors. These optimizations include SSE2, SSE3, and SSSE3 instruction sets and other optimizations. Intel does not guarantee the availability, functionality, or effectiveness of any optimization on microprocessors not manufactured by Intel. Microprocessor-dependent optimizations in this product are intended for use with Intel microprocessors. Certain optimizations not specific to Intel microarchitecture are reserved for Intel microprocessors. Please refer to the applicable product User and Reference Guides for more information regarding the specific instruction sets covered by this notice. Notice Revision #20110804 No license (express or implied, by estoppel or otherwise) to any intellectual property rights is granted by this document. Intel disclaims all express and implied warranties, including without limitation, the implied warranties of merchantability, fitness for a particular purpose, and non-infringement, as well as any warranty arising from course of performance, course of dealing, or usage in trade. This document contains information on products, services and/or processes in development. All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest forecast, schedule, specifications and roadmaps. The products and services described may contain defects or errors known as errata which may cause deviations from published specifications. Current characterized errata are available on request. Copies of documents which have an order number and are referenced in this document may be obtained by calling 1-800-548-4725 or by visiting www.intel.com/design/literature.htm. Intel, the Intel logo, Intel vpro, Look Inside., the Look Inside. logo, Intel Xeon Phi, and Xeon are trademarks of Intel Corporation in the U.S. and/or other countries. *Other names and brands may be claimed as the property of others. 2015 Intel Corporation.

Agenda Problem Statement and Introduction Identity Protection Technology Overview Intel IPT with PKI Intel IPT with MFA Summary Q&A

Agenda Problem Statement and Introduction Identity Protection Technology Overview Intel IPT with PKI Intel IPT with MFA Summary Q&A

Compromised Credentials Lead to Breach and Data Loss Top Organizations Attacked 2 1 3 3 Ground Zero for many attacks is compromised Identity 1 CNN Money 2014 2 NY Times 2014 3 DarkReading.com 2014

Number of Cracked Passwords Problem Statement Passwords are Problematic for end users and IT Complex Passwords are not the answer: Users can t remember complex passwords, costly to IT: 35-40% of helpdesk calls are password resets, 20-30% of helpdesk calls result from lost, stolen or broken credentials (Gartner * ) 20-30% of Helpdesk calls are related to lost, stolen, broken credentials for enterprises using discreet tokens (Gartner) Cost of Helpdesk call to reset token or issue temporary credential averages $25 per call (Meta) Complex password policies generate more costly helpdesk calls without added security (Wired * Article) 350,000 300,000 250,000 200,000 150,000 100,000 50,000 Distribution of Character Length of Cracked Passwords Username Password LSmith99 PaSSworD12 1 5 10 15 20 25 Character Length of Cracked Password Passwords are easily cracked, key-logged, phished & Intercepted, making them a security risk 1 Trustwave * 2014 Business Password Analysis

Identity and Access Management (IAM) Securing the Front Door a Key Challenge Many authentication factors including Passwords, Tokens, Key Infrastructure. But no unifying framework to simplify implementation, management, enforcement. Known challenges with current authentication methods: Passwords: Complex Users and IT = vulnerable Tokens and Smart Cards: Costly to maintain Software-based Keys: are at greater risk User Presence and context: Location confirmation is difficult Many weaknesses in traditional security make it difficult and expensive to optimize identity and access management

How Big is the Emerging Attack Surface? 1 source: Check Point Security Report 2014 2 source: BI Intelligence Investments 2014 Number of devices in use globally (in billions) An Average Day In An Average Enterprise 1 Every 1min a host accesses a malicious website Every 3mins a bot is communicating with its command and control center Every 9mins a High Risk application is being used Every 10mins a known malware is being downloaded Every 27mins an unknown malware is being downloaded Every 49mins sensitive data is sent outside the organization Every 24h a given host is infected with a bot 24 H 49 27 10 9 3 mins mins mins mins mins 1 min Forecast: Global Internet Device Installed Base 2 20 18 16 14 12 10 8 6 4 2 The Internet of Everything 0 2009 2010 2011 2012 2013E 2014E 2015E 2016E 2017E 2018E Connected Cars Wearables Connected TVs Internet of Things Tablets Smartphones PCs

Note: Not all features available across all products The Four Pillars of Intel s Security Focus Protect Detect Correct Identity Data Protection Anti-Malware Resiliency Protect user & device identities Protect data at rest and in transit Detect malware based on signature & behavior Correct security weaknesses & breaches Intel platforms ship with Security built-in!

Agenda Problem Statement and Introduction Identity Protection Technology Overview Intel IPT with PKI Intel IPT with MFA Summary Q&A

Intel Identity Protection Technology ONE-TIME PASSWORD (OTP) 883452 PROTECTED TRANSACTION DISPLAY + 345910 779132 561038 173490 One-Time Password token built into the chipset, enabling frictionless factor user authentication for more secure website and corporate access PUBLIC KEY INFRASTRUCTURE Uses hardware protected PKI certificates to authenticate user and server to each other and to encrypt and sign documents Helps protect PC display from malware scraping and proves human presence at PC. Great for transaction verification and ACH fraud prevention + Intel Identity Protection Technology: Embedded security ingredients to help protect confidential business data, and employee and customer identities ++ +Protected Transaction Display requires a device with Intel Integrated Graphics ++No computer system can provide absolute security. Requires an Intel Identity Protection Technology-enabled system, including an enabled Intel processor, enabled chipset, firmware, software and Intel integrated graphics (in some cases) and participating website/service.

Intel Identity Protection Technology with Multi Factor Authentication Key Use Cases: Domain/OS Login Remote Cloud Services Single Sign On Web log-in Potential Hardened Authentication Factors: VPN Login & Key Storage Walk-Away Lock of Platform & Services Drive Encryption Login PIN Protected Transactions Proximity Bluetooth, BLE Logical Location Intel AMT Location Tap to Login NFC Biometrics Face, Voice, Fingerprint Easy to use while strengthening authentication, factors and policies through hardware enhanced Multi -Factor Authentication for Corporate applications and services

Agenda Problem Statement and Introduction Identity Protection Technology Overview Intel IPT with PKI Intel IPT with MFA Summary Q&A

Intel Identity Protection Technology with PKI 1. Costs less than discreet smart cards 2. Ease of use of software 3. More secure than software 4. Integrated with secure I/O Server Intel Identity Protection Technology with PKI provides a second factor of authentication embedded into the PC that allows businesses to validate that a legitimate user is logging in from a trusted PC

Intel Identity Protection Technology with PKI v1.0 Architecture Client Applications Certificate Store Microsoft * CryptoAPI CryptoAPI CSP Host (Windows * ) Intel IPT-PKI Library Intel IPT Service Intel Pin User Interface Protected Transaction Display (Local) Intel software platform Other Intel Management Engine (Intel ME) Intel IPT-PKI Applet Intel Dynamic App Loader Intel Identity Protection Technology with PKI (Intel IPT-PKI)

Supported Cryptographic Algorithms Algorithms Type Intel IPT-PKI Support Proxy support RSA 1024/2048 private key usage RSA 1024/2048 public key usage DES, Triple DES, 2 key triple DES, RC2, RC4, AES128, AES192, AES256 SHA1, SHA256, SHA384, SHA512, SHAMD5 MAC, HMAC Asymmetric Asymmetric Symmetric Hashing MAC Intel Identity Protection Technology with PKI (Intel IPT-PKI) supports full cryptographic suite to maximize app compatibility

Key Usage and Storage Key generated in Intel Management Engine (Intel ME) Encrypted key passed back to Windows * Hardware Key securely used in Intel ME Key encrypted using AES256 and Platform Binding Key Encrypted key passed to Intel ME Encrypted key saved to Windows User store Operating System Key decrypted using Platform Binding Key Encrypted key loaded from Windows User store Intel Identity Protection Technology with PKI key storage is not limited by flash memory or Intel ME memory

Intel Identity Protection Technology (Intel IPT) with Protected Transaction Display Protects private key usage with PIN Created on key generation Requested on key usage What an End-User Sees PIN pad randomized Button values protected by PAVP What a Hacker Sees Provides PIN policy enforcement Graphics generated on the client

Intel Identity Protection Technology with PKI Version 3.0 Intel Identity Protection Technology (Intel IPT) Secure Import for PKI key-pair/certificate Based on Intel IPT with PKI Import certificate Scales Intel IPT with PKI to protect non-self-generated certificates in the Enterprise Hardware based Key Attestation based on Enhanced Privacy ID (EPID) Based on EPID Signature Provides additional protection against man-in-the-middle attacks Enables new Enterprise usages Secure cloud storage and file services Usages across multiple devices IPT with PKI v3.0 Enables New Enterprise Usages and Features

Intel Management Engine (Intel ME) Intel Identity Protection Technology with PKI (Intel IPT-PKI) Enterprise Certificate Enrollment Process with Intel IPT-PKI v3.0 Key Attestation Intel ME Applet Generate RSA Key pair, associate Policy Generate EKAE GenKeys Return Pub-Key Get Attestation Info Attestation Info (EKAE) Intel IPT-PKI CSP GenKeyPair Return Pub-key Gen Attestation Info Attestation Info (EKAE) Client Software Create CSR Enterprise Certificate Authority Send CSR (Pub-key+ Attestation Info) Return Signed Client Cert Key Attestation Verification

Intel IPT with PKI v3.0 - Secure Import Import Certificate/Key-pair properties: MUST be generated by Intel IPT-PKI MUST not be exportable CANNOT be used for general encrypt/decrypt operations, only import operations MUST contain the special Import OID specified in the Extended Key usage Enterprise PKI Infrastructure responsibility: Enterprise IT MUST create an import certificate template which specifies the key is non-exportable, used for signing operations only, and includes a special Import OID specified in the Extended Key usage Enterprise IT MUST ensure that a client has non-revoked import certificate Enterprise IT MUST ensure they are encrypting the keys to be imported with the correct import certificate Intel Identity Protection Technology with PKI (Intel IPT-PKI)

Secure Import (PKCS12 Public-key Privacy Mode) Intel ME Applet GenKeys Import KeyPair Generate RSA Key pair, associate Policy Return Pub-Key IPT-PKI CSP Client SW Create CSR Enterprise Certificate Authority Send CSR(Pub-key+EKAE) Return Import Certificate Import Cert Generation Migration Authority Verify and decrypt keypair SecureImportKey (PKCS#7 env data) Success or Failure Get Import Certificate Send Keypair Wrapped with Import cert in PKCS12 file Secure Key Import Validate Import cert, wrap keypair Intel Management Engine (Intel ME) Intel Identity Protection Technology with PKI (Intel IPT-PKI)

Independent Software Vendor (ISV) Integration Certificate Issuer Certificate Consumer Symantec * Managed PKI Service 4-6 week effort Primarily enabling certificate templates Microsoft * Certification Authority (CA) No change to Microsoft Certificate Authority Create/enable certificate templates Cisco *, MS Office *, Adobe *, Juniper *, Internet Explorer *, etc. All enabled with no software change Solution builds on top of standard Microsoft* CryptoAPI Intel Identity Protection Technology with PKI (Intel IPT-PKI) solution requires minimal ISV integration effort!

Market Leading Identity Provider RSA* Now Integrated with 5 th Generation Intel vpro Platforms RSA SecurID Software Token is protected in hardware by Intel Identity Protection (IPT) based Token Provider SecurID seed record protected and signed by encryption key that is stored on Intel chipset SecurID seed record cannot be removed (by malware) and run on a different machine Offers hardware level token security with the convenience of a software token Easy to install Driver install package then same process as provisioning SecurID software token

Agenda Problem Statement and Introduction Identity Protection Technology Overview Intel IPT with PKI Intel IPT with MFA Summary Q&A

Intel IPT with MFA For Corporate and Managed Small Businesses 1 Hardened with Intel s Security Technologies rooted in firmware and hardware Devices OS, Domain, and Drive Encryption 3 Network VPN Apps & Websites Single Sign-on & more 4 3 4 3 4 2 Supports a variety of hardened authentication factors 3 Designed as a horizontal capability and available to ISVs & OEMs 4 Easily integrates with existing corporate infrastructure Business Users Authenticate yourself Intel IPT w/ MFA Multi-Factor Authentication 1 2 IT Admin Manage your companies Authentication Policy 5 Provides hardened MFA policy management using your choice of console (e.g. McAfee epo, Microsoft* SCCM) Simply & Securely PIN Proximity Biometrics Location to securely login anywhere 5 Securely & Reliably Intel Identity Protection Technology with Multi-Factor Authentication (Intel IPT with MFA)

MFA: IT Flexibility with HW-assisted Enterprise Security 1 User to Device Authentication Domain login using Bluetooth PKI Password hash 2 Device to Network Authentication VPN login using PKI Bluetooth Technology/ Bluetooth Low Energy User Presence Protection 3 Walkaway lock/unlock Bluetooth Technology/Bluetooth Low Energy with PIN New Ways to Authenticate Single Sign on User Presence Protection AUTO LOCK Network Unlock Lock 4 IT Admin MFA Policy Management

Intel IPT with MFA End-to-End Solution Stack (Gen 2) 3 rd party Software factors Face Factor Software Finger Print Factor Software MFA Software Factor Manager IT Policy Agents MFA Policy Plugins Intel IPT with MFA Cred Provider Smartcard based Credential Provider Virt. Smart Card Mini Driver VPN App Phone Application Phone Factor Authenticator Android * /ios * Phone App Intel IPT w/ MFA Applets Intel IPT with MFA Host Service (API) Converged Security Management Engine Intel IPT- MFA Applet Intel IPT-PKI SW Stack Intel IPT- PKI Applet epo MFA Policy Extension Attestation McAfee epo MFA Policy Ext AD GPO MFA Policy Ext Client Software/Firmware Components SCCM Server Software Components Intel and/or 3 rd party Software Intel Software Existing product OEM / IHV Intel Identity Protection Technology with Multi Factor Authentication (Intel IPT with MFA)

Intel IPT with MFA: Policies Policies are designed to be expressive to support multiple factors and applications Factor Definition Policy Definition Action Definition Policy Specification Factor Declaration Policy Declaration Policy Instance Policy Declaration Options: AND/OR Factors (e.g., SecPIN, Bluetooth ) Context (e.g. Time, Location) Example Factor parameters Policy ID (OS Logon, Alice) SecBlueToothPhone AND SecPIN (WalkAwayLock, Alice) SecBlueToothPhone (VPN Logon, Alice) Fingerprint OR SecPIN Static Factor Set Continuous Factor Set SecPIN = Secure PIN (Intel Identity Protection Technology with Protected Transaction Display) Intel Identity Protection Technology with Multi Factor Authentication (Intel IPT with MFA)

Agenda Problem Statement and Introduction Identity Protection Technology Overview Intel IPT with PKI Intel IPT with MFA Summary Q&A

Summary Ground Zero for many cybersecurity attacks is compromised Identity Intel platforms ship with Security built-in at hardware level Intel IPT with PKI provides a second factor of authentication embedded into the PC Intel IPT with MFA provides ease of use while strengthening authentication, factors and policies through hardware for corporate applications and services

Questions? Please visit Exhibit Booth #100 to see our Demos! 32